Building a Digital Forensic Laboratory : Establishing and Managing a Successful Facility

by ; ;
Format: Paperback
Pub. Date: 2008-10-02
Publisher(s): Elsevier Science Ltd
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $89.20

Buy New

Usually Ships in 5-7 Business Days
$84.95

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$29.51
Online:90 Days access
Downloadable:90 Days
$35.41
Online:120 Days access
Downloadable:120 Days
$38.36
Online:150 Days access
Downloadable:150 Days
$40.32
Online:180 Days access
Downloadable:180 Days
$44.26
Online:1825 Days access
Downloadable:Lifetime Access
$98.34
Online:Lifetime Access access
Downloadable:Lifetime Access
$98.34
$44.26

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the investigations themselves. This includes a great need for information on how to cost-effectively establish and manage a computer forensics laboratory. This book meets that need: a clearly written, non-technical book on the topic of computer forensics with emphasis on the establishment and management of a computer forensics laboratory and its subsequent support to successfully conducting computer-related crime investigations. * Provides guidance on creating and managing a computer forensics lab * Covers the regulatory and legislative environment in the US and Europe * Meets the needs of IT professionals and law enforcement as well as consultants

Table of Contents

Computer Related Crime Investigations and Computer Forensics Management Support
This section provides a background to computer crime and addresses the Computer Forensics management issues related to Computer Forensic Incidents and Crime Investigations
It looks at how investigations are carried out, what needs to be considered in the planning of an investigation and the conduct of the investigation including the collection and storage of evidence
The section finishes with a number of case studies to highlight how things can go well if they are done properly and how they can go wrong if they are not
A Short History of Computer-Related Crimes and the Developing Need for Computer Forensics
This chapter will provide an overview of computer-related crimes from the less sophisticated and localized dial-up computer crimes to today's sophisticated, global, network attacks
As well as the history of the development of the computer forensics profession and increasingly formal computer forensics laboratories
An Introduction to Computer Forensics
This chapter provides an overview of the important concepts associated with "computer forensics."
It describes the potential sources of evidence available in the typical microcomputer, how to conduct a search for evidence, and a method of conducting a search in a systematic and effective manner
Types of Forensic Investigation
This chapter will include the reasons for carrying out the investigation and the type of investigation that is being undertaken, for example single computer, network or mobile devices
Responding to Crimes requiring Computer Forensic Investigation
This chapter will talk about what actions are required, the management considerations and just as importantly, what should not be done when responding to a high tech crime scene
It will deal with the differing requirements that must be considered for the range of types of investigation that the laboratory may be called on to take part in including; stand alone PCs, Servers, Networks, Live Acquisition and wireless and will discuss the management issues that relate to the use of function specific tools
Management of the Collections of Evidence
As the title states, this chapter will talk about the management issues that relate to the collection of high technology crime scene evidence, a crucial part of any high technology investigation
It will also deal with issues such as continuity of evidence in of custody
Management of evidence storage
This chapter will address the issues that relate to the storage of evidence and the management issues that need to be considered to ensure that it is carried out effectively and to meet the relevant rules and legislation
We will also address the difficult question of long term storage periods, a particular problem for Law Enforcement
High Technology Crimes: Case Summaries
This chapter gives a range of cases that illustrate the types of incidents that may be encountered under the general grouping of high technology crimes
There are examples of cases that have been successful and other examples that highlight that a lack of good procedures can lead to considerable expense, loss of credibility and embarrassment
This chapter will also address the specific roles that the computer forensics laboratory and staff play in each of the cases cited
Creating a Computer Forensics Laboratory
This Section will provide a background explanation of Computer Forensics and address management issues related to the creation of a laboratory and a computer forensic investigations laboratory
The section will include an introduction to computer forensics and the types of investigation that may be encountered and will give advice on things that need to be considered when establishing a laboratory
The section will give ad
Table of Contents provided by Publisher. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.